A. basic cannot be used in transparent proxy mode
B. basic requiresreauthentication with every new domain
C. NTLMSSP is compatible with open LDAP
D. NTLMSSP is more secure than basic
您可能感興趣的試卷
你可能感興趣的試題
A. Web Reputation
B. L4TM
C. Anti-Malware
D. URL Filters
A. make log
B. log config
C. w3c log config
D. advance dproxy config
E. mklog file
A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts
A.resetconfig
B.restoreconfig
C.loadconfig
D.reload
A. drop
B. pass-through
C. decrypt
D. block
A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies
A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user
A.time of day
B.user agent
C.proxy port
D.usage quotas
A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support
A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted
最新試題
Which statement about HTTPS decryption on the WSA is true?()
Match the troubleshooting tool with one of its features or functions.
A single transaction can be scanned in parallel by:()
Which of these is a suspect user agent?()
Which of these is not part of the pre_ installation worksheet?()
Which of these is a drawback in using McAfee heuristic scanning?()
What does the appearance of the ACL tag BLOCK_WBRS in the access log mean?()
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()